Identity Theft: Trends and Issues

Size: px
Start display at page:

Download "Identity Theft: Trends and Issues"

Transcription

1 Kristin M. Finklea Specialist in Domestic Security February 15, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service R40599

2 Summary In the current fiscal environment, policymakers are increasingly concerned with securing the economic health of the United States including combating those crimes that threaten to further undermine the nation s financial stability. Identity theft is one such crime. In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud the highest level since Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation s economy but its security. Consequently, in securing the nation and its economic health, policymakers are also tasked with reducing identity theft and its impact. Identity theft has remained the dominant consumer fraud complaint to the Federal Trade Commission (FTC). Nevertheless, while the number of overall identity theft complaints generally increased between when the FTC began recording identity theft complaints in 2000 and 2008, the number of complaints decreased in both 2009 and Prosecutions of federal identity theft violations have followed a similar pattern. However, while the number of identity theft cases filed and the number of defendants convicted both decreased in FY2009 and FY2010 relative to FY2008, the numbers of aggravated identity theft cases filed and defendants convicted have continued to increase. Congress continues to debate the federal government s role in (1) preventing identity theft and its related crimes, (2) mitigating the potential effects of identity theft after it occurs, and (3) providing the most effective tools to investigate and prosecute identity thieves. With respect to preventing identity theft, one issue concerning policymakers is the prevalence of personally identifiable information and in particular, the prevalence of Social Security numbers (SSNs) in both the private and public sectors. One policy option to reduce their prevalence may involve restricting the use of SSNs on government-issued documents such as Medicare identification cards. Another option could entail providing federal agencies with increased regulatory authority to curb the prevalence of SSN use in the private sector. In debating policies to mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements could affect the notification of relevant law enforcement authorities as well as any individuals whose personally identifiable information may be at risk from the breach. Congress may also be interested in assessing the true scope of data breaches, particularly involving government networks (e.g., S. 2105). There have already been several legislative and administrative actions aimed at curtailing identity theft. Congress enacted legislation naming identity theft as a federal crime in 1998 (P.L ) and later provided for enhanced penalties for aggravated identity theft (P.L ). In April 2007, the President s Identity Theft Task Force issued recommendations to combat identity theft, including specific legislative recommendations to close identity theft-related gaps in the federal criminal statutes. In a further attempt to curb identity theft, Congress directed the FTC to issue an Identity Theft Red Flags Rule (effective December 31, 2010), requiring that creditors and financial institutions with specified account types develop and institute written identity theft prevention programs. Congressional Research Service

3 Contents Introduction... 1 Definitions of Identity Theft... 2 Theft vs. Fraud... 3 Knowledge Element... 3 Legislative History... 3 Identity Theft Assumption Deterrence Act... 4 Identity Theft Penalty Enhancement Act... 4 Identity Theft Enforcement and Restitution Act of Identity Theft Task Force... 5 Recommendations... 5 Legislative Recommendations... 6 Red Flags Rule... 7 Trends in Identity Theft... 9 Perpetrators Investigations and Prosecutions Federal Bureau of Investigation (FBI) United States Secret Service (USSS) United States Postal Inspection Service (USPIS) Social Security Administration Office of the Inspector General (SSA OIG) Immigration and Customs Enforcement Department of Justice Domestic Impact Credit Card Fraud Document Fraud Employment Fraud Data Breaches and Identity Theft Potential Issues for Congress Identity Theft Prevention Securing Social Security Numbers Effects of Data Breaches Deterrence and Punishment Selected Legislation from the 112 th Congress Social Security Numbers...27 Law Enforcement and Consumer Notification Figures Figure 1. FTC Consumer Complaint Data Figure 2. FTC Identity Theft Complaint Data Figure 3. Federal Identity Theft and Aggravated Identity Theft Cases Figure 4. FTC Identity Theft Complaints, Figure 5. Total Number of Reported Data Breaches and Records Affected Congressional Research Service

4 Contacts Author Contact Information Congressional Research Service

5 Introduction In the current fiscal environment, policymakers are increasingly concerned with securing the economic health of the United States including combating those crimes that threaten to further undermine the nation s financial stability. 1 Identity theft, for one, poses both security and economic risks. By some estimates, identity fraud cost Americans $37 billion in FTC complaint data indicate that the most common fraud complaint received (19% of all consumer fraud complaints) is that of identity theft. 3 In 2010, for instance, about 8.1 million Americans were reportedly victims of identity fraud. This is a decrease of about 3 million from the approximately 11.1 million who were victimized in Despite this decline in the overall number of reported identity fraud incidents, difficulty in detecting and resolving these incidents may have contributed in higher consumer costs; the average identity fraud victim incurred a mean of $631 the highest level since An increase in globalization and a lack of cyber borders provide an environment ripe for identity thieves to operate from within the nation s borders as well as from beyond. Federal law enforcement is thus challenged with investigating criminals who may or may not be operating within U.S. borders; may have numerous identities actual, stolen, or cyber; and may be acting alone or as part of a sophisticated criminal enterprise. 6 In addition, identity theft is often interconnected with various other criminal activities. These activities range from credit card and bank fraud to immigration and employment fraud. In turn, the effects felt by individuals and businesses who have fallen prey to identity thieves extend outside of pure financial burdens; identity thieves affect not only the nation s economic health, but its national security as well. Consequently, policymakers may debate the federal government s role in preventing identity theft and its related crimes, mitigating the potential effects of identity theft after it occurs, and providing the most effective tools to investigate and prosecute identity thieves. This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC s Identity Theft Red Flags Rule, effective December 31, It also examines possible issues for Congress to consider. 1 See, for example, U.S. Congress, House Committee on Ways and Means, Role of Social Security Numbers in Identity Theft and Options to Guard Their Privacy, 112 th Cong., 1 st sess., April 13, Javelin Strategy & Research, 2011 Identity Fraud Survey Report: Consumer Version, February Federal Trade Commission, Consumer Sentinel Network Data Book for January December, 2010, March, 2011, 4 Javelin Strategy & Research, 2011 Identity Fraud Survey Report: Consumer Version, February Ibid. 6 For more information on these challenges, see CRS Report R41927, The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement, by Kristin M. Finklea. Congressional Research Service 1

6 Definitions of Identity Theft When does taking and using someone else s identity become a crime? Current federal law defines identity theft as a federal crime when someone knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. 7 The current federal law also provides enhanced penalties for aggravated identity theft when someone knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person in the commission of particular felony violations. 8 Aggravated identity theft carries an enhanced two-year prison sentence for most specified crimes and an enhanced five-year sentence for specified terrorism violations. Identity theft is also defined in the Code of Federal Regulations (CFR) as fraud committed or attempted using the identifying information of another person without permission. 9 Identity theft can both facilitate and be facilitated by other crimes. For example, identity theft may make possible crimes such as bank fraud, document fraud, or immigration fraud, and it may be aided by crimes such as theft in the form of robbery or burglary. 10 Therefore, one of the primary challenges in analyzing the trends in identity theft (e.g., offending, victimization, or prosecution rates) as well as the policy issues that Congress may wish to consider arises from this interconnectivity between identity theft and other crimes U.S.C. 1028(a)(7). 8 These felony violations as outlined in 18 U.S.C. 1028A include theft of public money, property, or records; theft, embezzlement, or misapplication by bank officer or employee theft from employee benefit plans; false personation of citizenship; false statements in connection with the acquisition of a firearm; fraud and false statements; mail, bank, and wire fraud; specified nationality and citizenship violations; specified passport and visa violations; obtaining customer information by false pretenses; specified violations the Immigration and Nationality Act relating to willfully failing to leave the United States after deportation and creating a counterfeit alien registration card and various other immigration offenses; specified violations of the Social Security Act relating to false statements relating to programs under the act; and specified terrorism violations. The basic penalty for identity theft under 18 U.S.C ranges from not more than five years imprisonment to not more than 30 years, depending on the circumstances. 9 According to the CFR definitional section for the Fair Credit Reporting Act (16 C.F.R ), [t]he term identifying information means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any (1) Name, Social Security number, date of birth, official State or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (2) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (3) Unique electronic identification number, address, or routing code; or (4) Telecommunication identifying information or access device (as defined in 18 U.S.C. 1029(e)). 10 Graeme R. Newman and Megan M. McNally, Identity Theft Literature Review, Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement, Contract #2005-TO-008, January 2005, Congressional Research Service 2

7 Theft vs. Fraud Identity theft and identity fraud are terms that are often used interchangeably. Identity fraud 11 is the umbrella term that refers to a number of crimes involving the use of false identification though not necessarily a means of identification belonging to another person. Identity theft is the specific form of identity fraud that involves using the personally identifiable information of someone else. Both identity fraud and identity theft are crimes often committed in connection with other violations, as mentioned above. Identity theft, however, may involve an added element of victimization, as this form of fraud may directly affect the life of the victim whose identity was stolen in addition to defrauding third parties (such as the government, employers, consumers, financial institutions, and health care and insurance providers, just to name a few). This report, however, maintains a focus on identity theft rather than the broader term of identity fraud. Knowledge Element Another definitional issue is one that was recently before the U.S. Supreme Court. The statutory definitions of identity theft and aggravated identity theft indicate that they are crimes when someone knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person in conjunction with specified felony violations outlined in the U.S. Code. The definitional element under question was the word knowingly. In Flores- Figueroa v. United States, the Court decided that in order to be found guilty of aggravated identity theft, a defendant must have knowledge that the means of identification he used belonged to another individual. 12 It is not sufficient to only have knowledge that the means of identification used was not his own. Although the case before the Court specifically involved aggravated identity theft, the issue may apply to the identity theft statute as well, due to its overlap in wording about the element of knowledge. Since the Court has issued its final decision in Flores-Figueroa v. United States, Congress may wish to consider whether there is a need to clarify the difference between these two types of knowledge in the U.S. Code. If a clarification is warranted, Congress may wish to consider whether the identity theft and aggravated identity theft statutes should be amended to reflect the definitions of both types of knowledge. Legislative History 13 Until 1998, identity theft was not a federal crime. 14 Leading up to Congress designating identity theft as a federal crime, identity fraud was on the rise, and the Internet was increasingly being 11 Identity fraud became a federal crime through the False Identification Crime Control Act of 1982 (P.L ), and it is codified at 18 U.S.C Flores-Figueroa v. United States, 129 S. Ct (2009). 13 The legislation described in this section covers those Acts directly related to the identity theft statutes. Other statutes, such as the credit reporting statutes, indirectly address identity theft by possibly assisting victims, however, they are not discussed here. For more information on the scope of federal laws relating to identity theft, see archived CRS Report RL31919, Federal Laws Related to Identity Theft, by Gina Stevens. See also CRS Report RL31666, Fair Credit Reporting Act: Rights and Responsibilities, by Margaret Mikyung Lee. 14 The first state to enact an identity theft law was Arizona in Congressional Research Service 3

8 used as a method of defrauding innocent victims. Law enforcement and policymakers suggested that the current laws at the time were ineffective at combating the growing prevalence of identity theft; 15 the laws were not keeping up with technology, and stronger laws were needed to investigate and punish identity thieves. 16 In addition, policymakers also suggested that industries that handled records containing individuals personally identifiable information such as credit, medical, and criminal records needed superior methods to ensure the validity of the information they collected and utilized. Identity Theft Assumption Deterrence Act In 1998, Congress passed the Identity Theft Assumption Deterrence Act (P.L ), which criminalized identity theft at the federal level. In addition to making identity theft a crime, this act provided penalties for individuals who either committed or attempted to commit identity theft and provided for forfeiture of property used or intended to be used in the fraud. It also directed the Federal Trade Commission (FTC) to record complaints of identity theft, provide victims with informational materials, and refer complaints to the appropriate consumer reporting and law enforcement agencies. The FTC now records consumer complaint data and reports it in the Identity Theft Data Clearinghouse; identity theft complaint data are available for 2000 and forward. 17 Identity Theft Penalty Enhancement Act Congress further strengthened the federal government s ability to prosecute identity theft with the passage of the Identity Theft Penalty Enhancement Act (P.L ). 18 This act established penalties for aggravated identity theft, in which a convicted perpetrator could receive additional penalties (two to five years imprisonment) for identity theft committed in relation to other federal crimes. Examples of such federal crimes include theft of public property, theft by a bank officer or employee, theft from employee benefit plans, false statements regarding Social Security and Medicare benefits, several fraud and immigration offenses, and specified felony violations pertaining to terrorist acts. Identity Theft Enforcement and Restitution Act of 2008 Most recently, Congress enhanced the identity theft laws by passing the Identity Theft Enforcement and Restitution Act of 2008 (Title II of P.L ). Among other elements, the act authorized restitution to identity theft victims for their time spent recovering from the harm caused by the actual or intended identity theft. 15 Before identity theft became a federal crime, identity fraud had been established as a crime in the False Identification Crime Control Act of 1982 (P.L ). However, the identity fraud statute did not contain a specific theft provision. 16 From remarks James Bauer, Deputy Assistant Director, Office of Investigations, U.S. Secret Service, before the U.S. Congress, Senate Committee on the Judiciary, Subcommittee on Technology, Terrorism, and Government Information, The Identity Theft and Assumption Deterrence Act, 105 th Cong., 2 nd sess., May 20, Unless otherwise noted in this report, all dates refer to calendar years rather than fiscal years. 18 Aggravated Identity Theft is codified at 18 U.S.C. 1028A. Congressional Research Service 4

9 Identity Theft Task Force In addition to congressional efforts to combat identity theft, there have been administrative efforts as well. The President s Identity Theft Task Force (Task Force) was established in May 2006 by Executive Order The task force was created to coordinate federal agencies in their efforts against identity theft, and it was charged with creating a strategic plan to combat (increase awareness of, prevent, detect, and prosecute) identity theft. It was composed of representatives from 17 federal agencies. 20 Recommendations In April 2007, the task force authored a strategic plan for combating identity theft in which it made recommendations in four primary areas: preventing identity theft by keeping consumer data out of criminals hands, preventing identity theft by making it more difficult for criminals to misuse consumer data, assisting victims in detecting and recovering from identity theft, and deterring identity theft by increasing the prosecution and punishment of identity thieves. 21 With respect to identity theft prevention, the task force suggested that decreasing the use of Social Security numbers (SSNs) in the public sector and reviewing the use of SSNs in the private sector could help prevent identity theft. Also, the task force suggested that educating employers and individuals on how to safeguard data, as well as establishing national data protection and breach notification standards, could further aid in preventing identity theft. Relating to victim assistance, the task force suggested that identity theft victims may be better served if first responders were specially trained to assist this particular class of victim. It also addressed victim redress by recommending that identity theft victims be able to obtain an alternative identification document after the theft of their identities. Through the Identity Theft Enforcement and Restitution Act of 2008 (Title II of P.L ), Congress responded to the task force s recommendation that criminal restitution statutes allow victims to be compensated for their time in recovering from the actual or attempted identity theft. 19 Executive Order 13402, Strengthening Federal Efforts To Protect Against Identity Theft, 71 Federal Register 93, May 15, Members of the task force included the Attorney General (chair), the Chairman of the Federal Trade Commission (co-chair), the Secretary of the Treasury, the Secretary of Commerce, the Secretary of Health and Human Services, the Secretary of Veterans Affairs, the Secretary of Homeland Security, the Director of the Office of Management and Budget, the Commissioner of Social Security, the Chairman of the Board of Governors of the Federal Reserve System, the Chairperson of the Board of Directors of the Federal Deposit Insurance Corporation, the Comptroller of the Currency, the Director of the Office of Thrift Supervision, the Chairman of the National Credit Union Administration Board, the Postmaster General, the Director of the Office of Personnel Management, and the Chairman of the Securities and Exchange Commission. 21 The President s Identity Theft Task Force, Combating Identity Theft: A Strategic Plan, April 23, 2007, at Congressional Research Service 5

10 Regarding identity theft deterrence, the task force recommended enhancing information gathering and sharing between domestic law enforcement agencies and the private sector, ramping up identity theft training for law enforcement and prosecutors, and increasing enforcement and prosecution of identity theft. The task force also promoted international cooperation to decrease identity theft through identifying countries that may be safe havens for identity thieves, encouraging anti-identity theft legislation in other countries, and increasing international cooperation in the investigation and prosecution of identity theft. Legislative Recommendations More specifically, the task force recommended that Congress close gaps in the federal criminal statues to more effectively prosecute and punish identity theft-related offenses by amending the identity theft and aggravated identity theft statutes so that thieves who misappropriate the identities of corporations and organizations and not just the identities of individuals can be prosecuted, amending the aggravated identity theft statute by adding new crimes as predicate offenses for aggravated identity theft violations, amending the statute criminalizing the theft of electronic data by eliminating provisions requiring that the information be stolen through interstate communications, amending the computer fraud statute by eliminating the requirement that damage to a victim s computer exceed $5,000, amending the cyber-extortion statute by expanding the definition of cyberextortion, and ensuring that the Sentencing Commission allows for enhanced sentences imposed on identity thieves whose actions affect multiple victims. 22 Congress has already taken steps to address some of these task force recommendations. Through the Identity Theft Enforcement and Restitution Act of 2008 (Title II of P.L ), Congress, among other things, eliminated provisions in the U.S. Code requiring the illegal conduct to involve interstate or foreign communication, eliminated provisions requiring that damage to a victim s computer amass to $5,000, and expanded the definition of cyber-extortion. However, Congress has not yet addressed the task force recommendation to expand the identity theft and aggravated identity theft statutes to apply to corporations and organizations as well as to individuals, nor has it addressed the recommendation to expand the list of predicate offenses for aggravated identity theft. Issues surrounding these recommendations are analyzed in the section Potential Issues for Congress. 22 Ibid. Congressional Research Service 6

11 Red Flags Rule 23 The Identity Theft Red Flags Rule, issued in 2007, requires creditors and financial institutions to implement identity theft prevention programs. It is implemented pursuant to the Fair and Accurate Credit Transactions (FACT) Act of 2003 (P.L ). The FACT Act amended the Fair Credit Reporting Act (FCRA) 24 by directing the FTC, along with the federal banking agencies and the National Credit Union Administration, to develop Red Flags guidelines. These guidelines require creditors 25 and financial institutions 26 with covered accounts 27 to develop and institute written identity theft prevention programs. According to the FTC, the identity theft prevention programs required by the rule must provide for identifying patterns, practices, or specific activities known as red flags that could indicate identity theft and then incorporating those red flags into the identity theft prevention program; detecting those red flags that have been incorporated into the identity theft prevention program; responding to the detection of red flags; and updating the identity theft prevention program periodically to reflect any changes in identity theft risks. 28 Possible red flags could include alerts, notifications, or warnings from a consumer reporting agency; 23 The Red Flags Rule is listed in the Code of Federal Regulations at 16 C.F.R The Red Flags Rule was issued jointly by the FTC; the Office of the Comptroller of the Currency, Treasury; the Board of Governors of the Federal Reserve System; the Federal Deposit Insurance Corporation; the Office of Thrift Supervision, Treasury; and the National Credit Union Administration. The final rules are available in the Federal Register. See Department of the Treasury, Office of the Comptroller of the Currency; Federal Reserve System; Federal Deposit Insurance Corporation; Department of the Treasury, Office of Thrift Supervision; National Credit Union Administration; Federal Trade Commission, Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit Transactions Act of 2003; Final Rule, 72 Federal Register , November 9, The FCRA is codified at 15 U.S.C Under the Red Flags Rule, a creditor is defined as any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit, 15 U.S.C. 1691a. The Red Flag Program Clarification Act of 2010 (S. 3987), signed by President Obama on December 18, 2010, limits this definition of a creditor, excluding any creditor that advances funds on behalf of a person for expenses incidental to a service provided by the creditor to that person. 26 Under the Red Flags Rule, a financial institution is defined as a State or National bank, a State or Federal savings and loan association, a mutual savings bank, a State or Federal credit union, or any other person that, directly or indirectly, holds a transaction account (as defined in 461(b) of title 12) belonging to a consumer, 15 U.S.C. 1681a(t). 27 A covered account is one that is used primarily for personal, family, or household purposes, and that involves multiple payments or transactions. These include credit card accounts, mortgage loans, automobile loans, margin accounts, cell phone accounts, utility accounts, checking accounts, savings accounts, and other accounts for which there is a foreseeable risk of identity theft. The Rule also requires creditors and financial institutions to periodically determine whether they maintain any covered accounts, 72 Federal Register Federal Trade Commission, Agencies Issue Final Rules on Identity Theft Red Flags and Notices of Address Discrepancy, press release, October 31, 2007, Congressional Research Service 7

12 suspicious documents; suspicious personally identifiable information, such as a suspicious address; unusual use of or suspicious activity relating to a covered account; and notices from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts. 29 The deadline for creditors and financial institutions to comply with the Red Flags Rule was originally set at November 1, However, many of the organizations affected by the Red Flags Rule were not prepared to institute their identity theft prevention programs by this date. Therefore, the FTC moved the deadline to May 1, 2009, 30 further extended the compliance date to November 1, 2009, 31 and later to June 1, The final enforcement date was set at December 31, 2010, 33 and this last extension was, in part, a result of the debate over whether Congress wrote the FACT Act Red Flags provision too broadly by including all entities qualifying as creditors and financial institutions (discussed further below). The effect that the Red Flags Rule will have on the prevalence of identity theft remains uncertain. One potential effect is that the Red Flags Rule may help creditors and financial institutions prevent identity theft by identifying potential lapses in security or suspicious activities that could lead to identity theft. This could possibly lead to an overall decrease in the number of identity theft incidents reported to the FTC, as well as the number of identity theft cases investigated and prosecuted. Once detected, the Red Flags Rule requires that the creditor or financial institution respond to the identified red flag. One response option that creditors and financial institutions might include in their prevention programs is to notify consumers or law enforcement of data breaches that could potentially lead to the theft of consumers personally identifiable information. While notification is not a required element in the identity theft prevention programs, 34 early notification could lead to consumers taking swift action to prevent identity theft or mitigate the severity of the damage that could result if they had not been notified as quickly. When the Red Flags Rule was created, the FTC originally estimated that it would impact approximately 11.1 million creditors and financial institutions required to implement the identity theft prevention programs. 35 The FTC estimated the total annual labor costs (for each of the first three years the rule is in effect) for all creditors and financial institutions covered by the rule to be Federal Trade Commission, FTC Will Grant Six-Month Delay of Enforcement of Red Flags Rule Requiring Creditors and Financial Institutions to Have Identity Theft Prevention Programs, press release, October 22, 2008, 31 Federal Trade Commission, FTC Will Grant Three-Month Delay of Enforcement of Red Flags Rule Requiring Creditors and Financial Institutions to Adopt Identity Theft Prevention Programs, press release, April 30, 2009, 32 Federal Trade Commission, FTC Extends Enforcement Deadline for Identity Theft Red Flags Rule, press release, October 30, 2009, 33 Federal Trade Commission, FTC Extends Enforcement Deadline for Identity Theft Red Flags Rule, press release, May 28, 2010, 34 The FTC has published a guide to assist businesses in creating the identity theft prevention programs, available at Federal Trade Commission, Fighting Fraud With the Red Flags Rule: A How-To Guide for Business, March 2009, 35 Identity Theft Red Flags Final Rule, p Congressional Research Service 8

13 about $143 million. 36 Some entities considered creditors or financial institutions under the rule expressed concern that the burden of the rule overlaps with burdens already incurred under other regulations. For example, the American Bar Association (ABA) questioned whether lawyers are considered creditors under the Red Flags Rule because they generally do not require payment until after services are rendered. Further, the American Medical Association indicated that physicians should be exempt from the Red Flags Rule because of patient privacy and security protections required by the Health Insurance Portability and Accountability Act (HIPAA). 37 In addition, there may have been concern that to avoid being considered creditors, some physicians could possibly require full payment at the time of service (rather than allowing deferred payments). This could in turn lead to some patients avoiding potentially necessary treatment if they are unable to pay in full at the time of service; on the other hand, the rule may have no effect on patients willingness to seek medical treatment. The Red Flag Program Clarification Act of 2010 (P.L ), signed by President Obama on December 18, 2010, limits the Red Flags Rule s definition of a creditor, excluding any creditor that advances funds on behalf of a person for expenses incidental to a service provided by the creditor to that person. This legislation does not exempt any broad categories of businesses or entities, but the majority of businesses in certain categories such as physicians would be exempt from Red Flags Rule compliance. The actual effects of the Red Flags Rule including effects on identity theft rates as well as any indirect consequences will not be evident until after full implementation by creditors and financial institutions. Congress may consider monitoring the effects of the impending Red Flags Rule on subsequent identity theft rates. Trends in Identity Theft As previously mentioned, research indicates that in 2010, about 8.1 million Americans were victims of identity theft. This is a decrease of about 3 million from the approximately 11.1 million who were victimized in Consumer complaints of identity theft to the FTC exhibited a corresponding decrease. The FTC received 250,854 consumer complaints of identity theft in 2010, down from 278,356 complaints in However, identity theft incidents reported to the FTC remain a fraction of the estimated victim population. There is a noted difference between the 250,854 complaints received by the FTC in 2010 and survey data indicating that about 8.1 million people were actually victimized. This disparity between research on identity theft victimization and consumer reports could be a result of several factors. For one, while some identity theft victims may file a report with the FTC, others may file complaints with credit bureaus, while still others may file complaints with law enforcement. Not all victims, however, may file complaints with consumer protection entities, credit reporting agencies, and law enforcement. Another possible factor contributing to the disparity is that victims may not for any number of reasons report an identity theft incident. These individuals, however, may be more likely to indicate the incident on a survey prompting them about their experiences with identity theft or fraud. 36 Ibid. Cost estimates are provided by OMB in three-year increments. Therefore, cost estimates for subsequent years are unavailable and could change from the estimates provided for the first three years. 37 Letter from American Medical Association et al. to William E. Kovacic, Chairman, U.S. Federal Trade Commission, September 30, 2008, HIPAA was enacted by P.L Fore more information on HIPAA or health information privacy, see CRS Report R40546, The Privacy and Security Provisions for Health Information in the American Recovery and Reinvestment Act of 2009, by Gina Stevens and Edward C. Liu. 38 Javelin Strategy & Research, 2011 Identity Fraud Survey Report: Consumer Version, February Congressional Research Service 9

14 Since the FTC began recording consumer complaint data in 2000, identity theft has remained the most common consumer fraud complaint. Figure 1 illustrates the number of identity theft complaints received by the FTC between 2000 and 2010 in relation to the number of all other fraud complaints received. According to CRS analysis, since 2000, the number of identity theft complaints has averaged about 35% of the total number of consumer complaints received by the FTC. 39 Figure 1. FTC Consumer Complaint Data Identity Theft and Other Fraud for Total FTC Consumer Fraud Complaints 1,000, , , , , , , , , , , , , , , , Other Fraud Identity Theft Source: CRS presentation of FTC Identity Theft Clearinghouse data. Annual reports for each calendar year are available at Notes: Data indicate the number of identity theft and other fraud complaints received by the FTC each calendar year. According to CRS analysis, between 2000 and 2010, the number of identity theft complaints has averaged about 35% of the total number of consumer complaints received by the FTC. The percentage has ranged between about 22% and about 40%. Identity theft has remained the dominant consumer fraud complaint to the FTC. However, while the number of overall identity theft complaints generally increased between 2000 (when the commission began recording identity theft complaints) and 2008, the number of complaints decreased in both 2009 and Figure 2 illustrates these trends in identity theft complaints reported to the FTC. 39 Between 2000 and 2010, the proportion of consumer fraud complaints that are classified as identity theft complaints has ranged from about 22% to about 40%. The total number of identity theft and other fraud complaints reported to the FTC are available from the annual Identity Theft Clearinghouse Data reports available at reports/sentinel-annual-reports/sentinel-cy2010.pdf. Congressional Research Service 10

15 Figure 2. FTC Identity Theft Complaint Data , , , , ,214 Year , , , ,977 86, , , , , , , , ,000 Total FTC Identity Theft Complaints Source: CRS presentation of FTC Identity Theft Clearinghouse data. Annual reports for each calendar year are available at Notes: Data indicate the number of identity theft complaints received by the FTC each calendar year. Perpetrators Increasing globalization and the expansion of the Internet have provided a challenging environment for law enforcement to both identify and apprehend identity thieves targeting persons residing in the United States. For one, these criminals may be operating from within U.S. borders as well as from beyond. There is no publically available information, however, delineating the proportion of identity theft (or other crimes known to be identity theft-related) committed by domestic and international criminals. 40 Secondly, while some identity thieves operate alone, others operate as part of larger criminal networks or organized crime syndicates. The FBI has indicated that it, for one, targets identity theft investigations on larger criminal networks. 41 These criminal networks may involve identity thieves located in various cities across the United States or in multiple cities around the world, and these criminals may be victimizing not only Americans, but persons living in countries across the globe. In a joint study by Verizon 40 Statistics are available on the proportion of cyber-related crimes committed by perpetrators from various countries. However, only a proportion of those crimes are identity theft crimes, and analysts therefore cannot reliably extrapolate the proportion of identity theft crimes committed by domestic and international criminals. 41 Federal Bureau of Investigation, Financial Crimes Report to the Public, Fiscal Year 2006, publications/financial/fcs_report2006/publicrpt06.pdf. Congressional Research Service 11

16 and the U.S. Secret Service of selected data breaches of businesses around the globe during 2010, 58% of data breaches by external agents sources outside the compromised organization were attributed to organized crime. 42 It is unknown, however, how many of these records compromised by organized crime were used in identity theft and related crimes. A third challenge in identifying identity thieves is that perpetrators may operate under multiple identities including actual identities, various stolen identities, and cyber identities and nicknames. Investigations and Prosecutions As mentioned earlier, identity theft is defined broadly, and it is directly involved in a number of other crimes and frauds. As a result, there are practical investigative implications that influence analysts abilities to understand the true extent of identity theft in the United States. For instance, only a proportion (the exact number of which is unknown) of identity theft incidents are reported to law enforcement. While some instances may be reported to consumer protection agencies (e.g., the FTC), credit reporting agencies (e.g., Equifax, Experian, and Trans Union), and law enforcement agencies, some instances may be reported to only one. For example, the FTC indicates that of the 42% of identity theft complaints that included information on whether the theft was reported to law enforcement, 72% were reported to law enforcement. 43 Another issue that may affect analysts abilities to evaluate the true extent of identity theft is that law enforcement agencies may not uniformly report identity theft because crime incident reporting forms may not necessarily contain specific categories for identity theft. In addition, there may not be standard procedures for recording the identity theft component of the criminal violations of primary concern. 44 Issues such as these may lead to discrepancies between data available on identity theft reported by consumers, identity theft reported by state and local law enforcement, and identity theft investigated and prosecuted by federal law enforcement. Various federal agencies are involved in investigating identity theft, including the Federal Bureau of Investigation (FBI), the United States Secret Service (USSS), the United States Postal Inspection Service (USPIS), the Social Security Administration Office of the Inspector General (SSA OIG), and the U.S. Immigration and Customs Enforcement (ICE). In addition, federal law enforcement agencies may work on task forces with state and local law enforcement as well as with international authorities to bring identity thieves to justice. The Department of Justice (DOJ) is responsible for prosecuting federal identity theft cases. 42 Wade Baker et al., 2011 Data Breach Investigations Report: A Study Conducted by the Verizon RISK Team in Cooperation with the United States Secret Service and the Dutch High Tech Crime Unit, Verizon, 2011, pp , Of note, external agents were involved in 92% of all data breaches. 43 Federal Trade Commission, Consumer Sentinel Network Data Book for January December, 2010, March, 2011, 44 Graeme R. Newman and Megan M. McNally, Identity Theft Literature Review, Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement, Contract #2005-TO-008, January 2005, Congressional Research Service 12

17 Federal Bureau of Investigation (FBI) The FBI investigates identity theft primarily through its Financial Crimes Section. However, because the nature of identity theft is cross-cutting and may facilitate many other crimes, identity theft is investigated in other sections of the FBI as well. The FBI is involved in over 20 identity theft task forces and working groups around the country. It is also involved in over 80 other financial crimes task forces, which may also investigate cases with identity theft elements. 45 The FBI focuses its identity theft crime fighting resources on those cases involving organized groups of identity thieves and criminal enterprises that affect a large number of victims. 46 The FBI partners with the National White Collar Crime Center (NW3C) to form the Internet Crime Complaint Center (IC3). The IC3 serves the broad law enforcement community to receive, develop, and refer Internet crime complaints including those of identity theft. 47 In 2010, 9.8% of all Internet crime complaints received by the IC3 were that of identity theft. 48 However, other complaint categories such as credit card fraud may have involved incidents of identity theft as well. United States Secret Service (USSS) The USSS serves a dual mission of (1) protecting the nation s financial infrastructure and payment systems to safeguard the economy and (2) protecting national leaders. 49 In carrying out the former part of this mission, the USSS conducts criminal investigations into counterfeiting, financial crimes, computer fraud, and computer-based attacks on the nation s financial and critical infrastructures. The Secret Service has 38 Financial Crimes Task Forces and 31 Electronic Fraud Task Forces that investigate identity theft, as well as a number of other crimes. 50 In FY2010, the Secret Service arrested 4,040 suspects for crimes related to identity theft, and in FY2011, they arrested 4,570 such suspects. 51 United States Postal Inspection Service (USPIS) The USPIS is involved in inter-agency task forces investigating identity theft and is the lead federal investigative agency when identity thieves have used the postal system in conducting their fraudulent activities. The most recent USPIS data indicate that in FY2010, the USPIS participated in 18 identity theft task forces, and postal inspectors arrested 759 identity theft suspects from 45 U.S. Department of Justice, Fact Sheet: The Work of the President s Identity Theft Task Force, September 19, 2006, p. 3, 46 Federal Bureau of Investigation, Financial Crimes Report to the Public, Fiscal Year 2006, publications/financial/fcs_report2006/publicrpt06.pdf. 47 See the IC3 website at Among the many Internet crimes reported to the IC3 are identity theft and phishing. Phishing refers to gathering identity information from victims under false pretences, such as pretending to be a representative of a financial institution collecting personal information to update financial records. 48 The IC3 received a total of 303,809 Internet crime complaints. However, it did not make publically available the exact number of these complaints which were identity theft complaints, but rather indicated that identity theft made up about 9.8% of total Internet crime complaints. Internet Crime Complaint Center, 2010 Internet Crime Report, U.S.C U.S. Secret Service, United States Secret Service, Fiscal Year 2010 Annual Report, USSS2010AYweb.pdf. 51 Information provided to CRS by the USSS office of Congressional Affairs. Congressional Research Service 13

18 both USPIS investigations and task force investigations in which the USPIS was involved. 52 In addition to investigating identity theft, the USPIS has been involved in delivering educational presentations to consumer groups to assist in preventing identity theft, and inspectors are involved in sponsoring outreach programs for victims of identity theft; in FY2010, they provided 667 cases of identity theft victim assistance. 53 Examples of victim services include notifying victims of potential identity theft if the USPIS discovers compromised identities as well as assisting in victim restitution by providing victims money from the funds forfeited as a result of USPIS identity theft investigations. 54 Social Security Administration Office of the Inspector General (SSA OIG) Because the theft and misuse of Social Security numbers (SSNs) is one of the primary modes of identity theft, the SSA OIG is involved in investigating identity theft. The SSA has programs to assist victims of identity theft who have had their SSNs stolen or misused by placing fraud alerts on their credit files, replacing Social Security cards, issuing new Social Security numbers in specific instances, and helping to correct victims earnings records. 55 The SSA OIG protects the integrity of the SSN by investigating and detecting fraud, waste, and abuse. It also determines how the use or misuse of SSNs influences programs administered by the SSA. The SSA OIG is involved in providing a limited range of SSN verification for law enforcement agencies. Further, the SSA OIG maintains a hotline for consumers to report identity theft, and then these data are transferred to the FTC to be included in their consumer complaint database. 56 Immigration and Customs Enforcement The U.S. Immigration and Customs Enforcement (ICE) investigates cases involving identity theft, particularly immigration cases that involve document and benefit fraud. In FY2008, ICE conducted 3,636 investigations of document and benefit fraud. In addition, it made 1,652 criminal arrests and seized about $10.3 million related to document and benefit fraud. 57 In 2006, ICE created Document and Benefit Fraud Task Forces (DBFTFs). These DBFTFs, located in 18 cities throughout the United States, are aimed at dismantling and seizing the financial assets of criminal organizations that threaten the nation s security by engaging in document and benefits fraud. Department of Justice The U.S. Attorneys Offices (USAOs) prosecute federal identity theft cases referred by the various investigative agencies. CRS was unable to determine the proportion of identity theft cases 52 Data provided to CRS by the USPIS Office of Congressional Affairs, November 30, U.S. Postal Inspection Service, U.S. Postal Inspection Service Annual Report FY2010, 54 United States Postal Inspection Service, FY2007 Annual Report of Investigations of the United States Postal Inspection Service, January 2008, pp , 55 Social Security Administration, Identity Theft Fact Sheet, October 2006, idtheft.htm. 56 Information provided to CRS by the Social Security Administration, Office of the Inspector General, Office of Congressional Affairs, March 25, U.S. Immigration and Customs Enforcement, ICE Fiscal Year 2008 Annual Report: Protecting National Security and Upholding Public Safety, 2008, p. iv, Congressional Research Service 14

Identity Theft: Trends and Issues

Identity Theft: Trends and Issues Kristin M. Finklea Analyst in Domestic Security May 27, 2010 Congressional Research Service CRS Report for Congress Prepared for Members and Committees of Congress 7-5700 www.crs.gov R40599 c11173008 Report

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE

More information

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009 NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, 100.1 Complaints Per 100,000 Population, 19319 Complaints (2007) Updated January 25, 2009 Current Laws: A person is guilty of identity theft when he knowingly

More information

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: CS/HB 1363 Organized Criminal Activity SPONSOR(S): Gonzalez and others TIED BILLS: IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Safety &

More information

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 Current Laws: It is unlawful for any person to willfully and with

More information

Selected Federal Data Security Breach Legislation

Selected Federal Data Security Breach Legislation Selected Federal Data Security Breach Legislation name redacted Legislative Attorney April 9, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service

More information

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 Current Laws: A person is guilty of identity fraud when that person:

More information

Cumulative Identity Theft Statutes Updated as of July 26, 2011

Cumulative Identity Theft Statutes Updated as of July 26, 2011 State Bill Number Summary Adopted AL SB 68 Classifies all instances of identity theft as Class C felonies and extends the statute of limitations to seven years. AZ SB 1045 Adds to the list of offenses

More information

Department of Legislative Services

Department of Legislative Services Department of Legislative Services Maryland General Assembly 2008 Session SB 972 FISCAL AND POLICY NOTE Senate Bill 972 Judicial Proceedings (Senator Forehand) Identity Fraud - Seizure and Forfeiture This

More information

Immigration-Related Worksite Enforcement: Performance Measures

Immigration-Related Worksite Enforcement: Performance Measures Immigration-Related Worksite Enforcement: Performance Measures Andorra Bruno Specialist in Immigration Policy June 24, 2010 Congressional Research Service CRS Report for Congress Prepared for Members and

More information

NCSL SUMMARY P.L (HR 4472)

NCSL SUMMARY P.L (HR 4472) 1 of 6 5/17/2007 8:29 AM NCSL SUMMARY P.L. 109-248 (HR 4472) Adam Walsh Child Protection and Safety Act of 2006 Congressional Action March 8, 2006: Passed House by voice vote July 20, 2006: Passed Senate

More information

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes BUSINESS LAW Chapter 8 Criminal Law and Cyber Crimes Learning Objectives List and describe the essential elements of a crime. Describe criminal procedure, including arrest, indictment, arraignment, and

More information

Corporate Administration Detection and Prevention of Fraud and Abuse CP3030

Corporate Administration Detection and Prevention of Fraud and Abuse CP3030 Corporate Administration Detection and Prevention of Fraud and Abuse CP3030 Original Effective Date: May 1, 2007 Revision Date: April 5, 2017 Review Date: April 5, 2017 Page 1 of 3 Sponsor Name & Title:

More information

Federal Efforts and Legislation

Federal Efforts and Legislation Federal Efforts and Legislation Combating Sexual Exploitation and Trafficking: The Mann Act of 1910 This act was originally created to combat forced prostitution and debauchery. The Mann act made it a

More information

Privacy Act of 1974: A Basic Overview. Purpose of the Act. Congress goals. ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am

Privacy Act of 1974: A Basic Overview. Purpose of the Act. Congress goals. ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am Privacy Act of 1974: A Basic Overview 1 ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am Presented by: Jonathan Cantor, Deputy CPO, Dep t of Homeland Security (DHS) Alex Tang, Attorney,

More information

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law:

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law: Chapter 10 The Criminal Law and Business Below is a table that highlights the differences between civil law and criminal law: Crime a wrong against society proclaimed in a statute and, if committed, punishable

More information

BILL HORN SUPERVISOR, FIFTH DISTRICT SAN DIEGO COUNTY BOARD OF SUPERVISORS

BILL HORN SUPERVISOR, FIFTH DISTRICT SAN DIEGO COUNTY BOARD OF SUPERVISORS DATE: September 28, 2004 BILL HORN SUPERVISOR, FIFTH DISTRICT SAN DIEGO COUNTY BOARD OF SUPERVISORS AGENDA ITEM TO: Board of Supervisors SUBJECT: (District: 5) SUMMARY: Overview This year, more than ten

More information

Families Against Mandatory Minimums 1612 K Street, N.W., Suite 700 Washington, D.C

Families Against Mandatory Minimums 1612 K Street, N.W., Suite 700 Washington, D.C Families Against Mandatory Minimums 1612 K Street, N.W., Suite 700 Washington, D.C. 20006 202-822-6700 www.famm.org Summary of The Gang Deterrence and Community Protection Act of 2005 Title I Criminal

More information

ICE. I.C.E. Under D.H.S. Customs and INS Investigations DRO

ICE. I.C.E. Under D.H.S. Customs and INS Investigations DRO ICE What is I.C.E.? IMMIGRATION & CUSTOMS ENFORCEMENT I.& N.S. Under D.O.J Investigations / Inspections/ DRO/Exams/ Records; USBP I.C.E. Under D.H.S. Customs and INS Investigations DRO C.B.P. USBP / Inspections

More information

The Legal Workforce Act 1 Section-by-Section

The Legal Workforce Act 1 Section-by-Section The Legal Workforce Act 1 Section-by-Section Sec. 1: Short Title Legal Workforce Act. PROCESS FOR EMPLOYMENT ELIGBILITY VERIFICATION Sec. 2: Employment Eligibility Verification Process Amends INA 274A(b)

More information

ADMINISTRATION S WHITE PAPER ON INTELLECTUAL PROPERTY ENFORCEMENT LEGISLATIVE RECOMMENDATIONS

ADMINISTRATION S WHITE PAPER ON INTELLECTUAL PROPERTY ENFORCEMENT LEGISLATIVE RECOMMENDATIONS ADMINISTRATION S WHITE PAPER ON INTELLECTUAL PROPERTY ENFORCEMENT LEGISLATIVE RECOMMENDATIONS MARCH 2011 INTRODUCTION On June 22, 2010, the U.S. Intellectual Property Enforcement Coordinator (IPEC) issued

More information

Immigration-Related Worksite Enforcement: Performance Measures

Immigration-Related Worksite Enforcement: Performance Measures Immigration-Related Worksite Enforcement: Performance Measures Andorra Bruno Specialist in Immigration Policy June 23, 2015 Congressional Research Service 7-5700 www.crs.gov R40002 Summary Under current

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION Page 1 of 8 UNITED STATES OF AMERICA IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION -vs- Case No.: MARK ALLEN KIEL USM Number: 21883-045 Philip A. LeVota, Retained

More information

Health Care Fraud and Abuse Laws Affecting Medicare and Medicaid: An Overview

Health Care Fraud and Abuse Laws Affecting Medicare and Medicaid: An Overview Health Care Fraud and Abuse Laws Affecting Medicare and Medicaid: An Overview name redacted Legislative Attorney July 22, 2016 Congressional Research Service 7-... www.crs.gov RS22743 Summary A number

More information

The President. Part III. Thursday, November 19, Executive Order Establishment of the Financial Fraud Enforcement Task Force

The President. Part III. Thursday, November 19, Executive Order Establishment of the Financial Fraud Enforcement Task Force Thursday, November 19, 2009 Part III The President Executive Order 13519 Establishment of the Financial Fraud Enforcement Task Force VerDate Nov2008 12:15 Nov 18, 2009 Jkt 220001 PO 00000 Frm 00001

More information

Issue Brief. A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005

Issue Brief. A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005 A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005 By David B. Reddick State Affairs Manager Southeast Region Executive Summary State legislators have moved quickly

More information

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0 1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create

More information

Offices of Inspectors General and Law Enforcement Authority: In Brief

Offices of Inspectors General and Law Enforcement Authority: In Brief Offices of Inspectors General and Law Enforcement Authority: In Brief Wendy Ginsberg Analyst in American National Government September 8, 2014 Congressional Research Service 7-5700 www.crs.gov R43722 Summary

More information

Electronic Employment Eligibility Verification

Electronic Employment Eligibility Verification Andorra Bruno Specialist in Immigration Policy March 19, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R40446 Summary The

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION St. Cloud Regional Airport 1550 45 th Avenue Southeast, Suite #1 NEW St. Cloud, MN 56304-9535 (320) 255-7292 RENEWAL www.stcloudairport.com BADGE # ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

More information

Subscriber Registration Agreement. Signing up is as easy as 1, 2, 3...

Subscriber Registration Agreement. Signing up is as easy as 1, 2, 3... Subscriber Registration Agreement You must be a registered user to access certain e-government services through Alabama Interactive. Alabama Interactive, Inc 100 North Union Street Suite 630 Montgomery,

More information

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a THE PRIVACY ACT OF 1974 (As Amended) Public Law 93-579, as codified at 5 U.S.C. 552a Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, that

More information

Section-by-Section Summary of Legal Workforce Act. Prepared by the American Immigration Lawyers Association Last updated on 9/13/2011- DRAFT VERSION

Section-by-Section Summary of Legal Workforce Act. Prepared by the American Immigration Lawyers Association Last updated on 9/13/2011- DRAFT VERSION Section-by-Section Summary of Legal Workforce Act Prepared by the American Immigration Lawyers Association Last updated on 9/13/2011- DRAFT VERSION On June 14, 2011, Rep. Lamar Smith (R-TX) introduced

More information

GAO. CRIMINAL ALIENS INS Efforts to Remove Imprisoned Aliens Continue to Need Improvement

GAO. CRIMINAL ALIENS INS Efforts to Remove Imprisoned Aliens Continue to Need Improvement GAO United States General Accounting Office Report to the Chairman, Subcommittee on Immigration and Claims, Committee on the Judiciary, House of Representatives October 1998 CRIMINAL ALIENS INS Efforts

More information

Business Law Chapter 9 Handout

Business Law Chapter 9 Handout Major Differences: 2 Felonies Serious crimes, punishable by Death or prison for more than one (1) year. Misdemeanors Non-serious (petty) crimes punishable by jail for less than one(1) year and/or by fines.

More information

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE SECURITY DEPARTMENT USE ONLY: FP STA CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE Print or Type all Information SECTION I -- APPLICANT SSN: NAME (Last, First, Middle):

More information

Immigration-Related Worksite Enforcement: Performance Measures

Immigration-Related Worksite Enforcement: Performance Measures Immigration-Related Worksite Enforcement: Performance Measures Andorra Bruno Specialist in Immigration Policy August 7, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional

More information

STATE OMNIBUS BILLS AND LAWS January 1 June 30, 2011

STATE OMNIBUS BILLS AND LAWS January 1 June 30, 2011 State Chamber Bill # Status Title Summary AL H 56 Enacted This law addresses a range of topics including law enforcement, employment, education, public benefits, harbor/transport/rental housing, voting

More information

EXECUTIVE ORDER ESTABLISHMENT OF THE TASK FORCE ON MARKET INTEGRITY AND CONSUMER FRAUD

EXECUTIVE ORDER ESTABLISHMENT OF THE TASK FORCE ON MARKET INTEGRITY AND CONSUMER FRAUD This document is scheduled to be published in the Federal Register on 07/16/2018 and available online at https://federalregister.gov/d/2018-15299, and on govinfo.gov EXECUTIVE ORDER 13844 - - - - - - -

More information

BUILDING TRUST WITH COMMUNITIES, UPHOLDING DUE PROCESS SUPERVISING ATTORNEY IMMIGRANT LEGAL RESOURCE CENTER SEPTEMBER 2015

BUILDING TRUST WITH COMMUNITIES, UPHOLDING DUE PROCESS SUPERVISING ATTORNEY IMMIGRANT LEGAL RESOURCE CENTER SEPTEMBER 2015 BUILDING TRUST WITH COMMUNITIES, UPHOLDING DUE PROCESS PRESENTED BY: ANGIE JUNCK, SUPERVISING ATTORNEY IMMIGRANT LEGAL RESOURCE CENTER SEPTEMBER 2015 OVERVIEW 1. S-COMM v. PEP 2. Alameda County Jail Policy

More information

GENERAL ASSEMBLY OF NORTH CAROLINA EXTRA SESSION 1994 H 1 HOUSE BILL 144. February 14, 1994

GENERAL ASSEMBLY OF NORTH CAROLINA EXTRA SESSION 1994 H 1 HOUSE BILL 144. February 14, 1994 GENERAL ASSEMBLY OF NORTH CAROLINA EXTRA SESSION H HOUSE BILL Short Title: Money Laundering Offense. Sponsors: Representatives B. Miller and Moore. Referred to: Judiciary III. (Public) February, A BILL

More information

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE STA APPROVAL CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE Print or Type all Information SECTION I -- APPLICANT SSN: NAME (Last, First, Middle): HOME ADDRESS (Street,

More information

ID ACCESS BADGE APPLICATION FOR SECURED AREA/SECURITY IDENTIFICATION DISPLAY AREA (SIDA) / STERILE AREA

ID ACCESS BADGE APPLICATION FOR SECURED AREA/SECURITY IDENTIFICATION DISPLAY AREA (SIDA) / STERILE AREA ID ACCESS BADGE APPLICATION FOR SECURED AREA/SECURITY IDENTIFICATION DISPLAY AREA (SIDA) / STERILE AREA SECTION 1 TODAY S DATE: PROVIDE FULL LEGAL NAME 3880 NE 39 th Avenue, Suite A Airport Operations

More information

Chapter 8. Criminal Wrongs. Civil and Criminal Law. Classification of Crimes

Chapter 8. Criminal Wrongs. Civil and Criminal Law. Classification of Crimes Chapter 8 Criminal Wrongs Civil and Criminal Law Civil (Tort) Law Spells our the duties that exist between persons or between citizens and their governments, excluding the duty not to commit crimes. In

More information

Case 3:13-cv JE Document 1 Filed 12/20/13 Page 1 of 13 Page ID#: 1

Case 3:13-cv JE Document 1 Filed 12/20/13 Page 1 of 13 Page ID#: 1 Case 3:13-cv-02274-JE Document 1 Filed 12/20/13 Page 1 of 13 Page ID#: 1 Jennifer R. Murray, OSB #100389 Email: jmurray@tmdwlaw.com TERRELL MARSHALL DAUDT & WILLIE PLLC 936 North 34th Street, Suite 300

More information

Asset Forfeiture Model State Law April 9, 2011

Asset Forfeiture Model State Law April 9, 2011 Asset Forfeiture Model State Law April 9, 2011 Table of Contents GENERAL PROVISIONS 100.01 Definitions 100.02 Purpose 100.03 Exclusivity 100.04 Criminal asset forfeiture 100.05 Conviction required; standard

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 S 1 SENATE BILL 604. Short Title: NC Illegal Immigration Enforcement Act. (Public) April 19, 2011

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 S 1 SENATE BILL 604. Short Title: NC Illegal Immigration Enforcement Act. (Public) April 19, 2011 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 S 1 SENATE BILL 0 Short Title: NC Illegal Immigration Enforcement Act. (Public) Sponsors: Referred to: Senators East; Allran, Brock, and Hise. Rules and Operations

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;

More information

A comparison of 2006 Colorado immigration reform legislation to. The Georgia Security and Immigration Compliance Act [ SB 529]

A comparison of 2006 Colorado immigration reform legislation to. The Georgia Security and Immigration Compliance Act [ SB 529] A comparison of 2006 Colorado immigration reform legislation to The Georgia Security and Immigration Compliance Act [ SB 529] Summary of 2006 Colorado bills * Senate Bill 110 (Sen. Tom Wiens, R-Castle

More information

Solicitation of New Safe Harbors and Special Fraud Alerts. Portability and Accountability Act of 1996 (HIPAA), this annual

Solicitation of New Safe Harbors and Special Fraud Alerts. Portability and Accountability Act of 1996 (HIPAA), this annual This document is scheduled to be published in the Federal Register on 12/30/2014 and available online at http://federalregister.gov/a/2014-30156, and on FDsys.gov DEPARTMENT OF HEALTH AND HUMAN SERVICES

More information

Case 8:07-cr AG Document 141 Filed 01/11/11 Page 1 of 6 Page ID #:2159. United States District Court Central District of California

Case 8:07-cr AG Document 141 Filed 01/11/11 Page 1 of 6 Page ID #:2159. United States District Court Central District of California Case 8:07-cr-00069-AG Document 141 Filed 01/11/11 Page 1 of 6 Page ID #:2159 ***CONDITION OF SUPERVISED RELEASE NO. 4 AMENDED 1/11/11*** United States District Court Central District of California UNITED

More information

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003 Order Code RL31727 Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress February 4, 2003 Lisa M. Seghetti Analyst in Social Legislation Domestic Social

More information

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER Alan G. Hevesi COMPTROLLER DEPARTMENT OF MOTOR VEHICLES CONTROLS OVER THE ISSUANCE OF DRIVER S LICENSES AND NON-DRIVER IDENTIFICATIONS 2001-S-12

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION Page 1 of 6 UNITED STATES OF AMERICA IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION -vs- BRANDY NICOLE NEELEY Case No.: 13-00014-04-CR-W-DW USM Number: 25077-045

More information

CRS Report for Congress

CRS Report for Congress CRS Report for Congress Received through the CRS Web Order Code RS22180 June 29, 2005 Unauthorized Employment of Aliens: Basics of Employer Sanctions Summary Alison M. Smith Legislative Attorney American

More information

CHAPTER House Bill No. 7009

CHAPTER House Bill No. 7009 CHAPTER 2014-145 House Bill No. 7009 An act relating to security for public deposits; amending s. 280.02, F.S.; revising definitions; amending s. 280.03, F.S.; clarifying provisions exempting public deposits

More information

PROHIBITION ON MONEY LAUNDERING LAW, * Chapter One: Interpretation. "stock exchange" as defined in section 1 of the Securities Law;

PROHIBITION ON MONEY LAUNDERING LAW, * Chapter One: Interpretation. stock exchange as defined in section 1 of the Securities Law; PROHIBITION ON MONEY LAUNDERING LAW, 5760-2000 * Chapter One: Interpretation Definitions 1. In this Law - "stock exchange" as defined in section 1 of the Securities Law; "the Postal Bank" shall have the

More information

UNITED STATES DISTRICT COURT Southern District of Florida Miami Division

UNITED STATES DISTRICT COURT Southern District of Florida Miami Division Case 1:16-cr-20803-BB Document 129 Entered on FLSD Docket 12/19/2017 Page 1 of 6 USDC FLSD 245B (Rev. 09/08) - Judgment in a Criminal Case Page 1 of 6 UNITED STATES DISTRICT COURT Southern District of

More information

Georgia Computer System Protection Act

Georgia Computer System Protection Act Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia

More information

County of Santa Clara Office of the District Attorney

County of Santa Clara Office of the District Attorney County of Santa Clara Office of the District Attorney 65137 A DATE: November 7, 2012 TO: FROM: SUBJECT: Board of Supervisors Jeffrey F. Rosen, District Attorney Civil Detainer Policy Review RECOMMENDED

More information

Instructions for Consideration of Deferred Action for Childhood Arrivals

Instructions for Consideration of Deferred Action for Childhood Arrivals Instructions for Consideration of Deferred Action for Childhood Arrivals Department of Homeland Security U.S. Citizenship and Immigration Services USCIS Form I-821D OMB No. 1615-0124 Expires 01/31/2019

More information

CHAPTER House Bill No. 1845

CHAPTER House Bill No. 1845 CHAPTER 2001-233 House Bill No. 1845 An act relating to the criminal use of personal information; amending s. 817.568, F.S.; providing that the willful and fraudulent use of personal identification information

More information

Supreme Court of Florida

Supreme Court of Florida Supreme Court of Florida No. SC07-1664 IN RE: STANDARD JURY INSTRUCTIONS IN CRIMINAL CASES REPORT NO. 2007-7. [April 24, 2008] PER CURIAM. The Supreme Court Committee on Standard Jury Instructions in Criminal

More information

Fraud. Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION

Fraud. Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION Fraud Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION This policy establishes procedures and responsibilities for detecting, reporting, and resolving instances of

More information

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A

More information

U.S. Victims of State Sponsored Terrorism Fund Application Form OMB No Expires 1/31/2017

U.S. Victims of State Sponsored Terrorism Fund Application Form OMB No Expires 1/31/2017 Instructions: Please complete the questions included in this Application (the ) as your submission for compensation from the United States Victims of State Sponsored Terrorism Fund (the Fund ). If you

More information

CALIFORNIA THEFT CRIMES UNDERSTANDING THE OFFENSES AND PENALTIES

CALIFORNIA THEFT CRIMES UNDERSTANDING THE OFFENSES AND PENALTIES CALIFORNIA THEFT CRIMES UNDERSTANDING THE OFFENSES AND PENALTIES Understanding the Various Theft Offenses And the Corresponding Penalties Is Important If You Have Been Charged with One DOMENIC J. LOMBARDO

More information

False Claims Act. Definitions:

False Claims Act. Definitions: False Claims Act Colorado Access is committed to a culture of compliance in which its employees, providers, contractors, and consultants are educated and knowledgeable about their role in reporting concerns

More information

GAO. HOMELAND SECURITY Challenges to Implementing the Immigration Interior Enforcement Strategy

GAO. HOMELAND SECURITY Challenges to Implementing the Immigration Interior Enforcement Strategy GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, April 10, 2003 United States General Accounting Office Testimony Before the Subcommittee on Immigration, Border Security and Claims, Committee

More information

Case 8:15-cr JLS Document 59 Filed 03/09/18 Page 1 of 6 Page ID #:300 United States District Court Central District of California

Case 8:15-cr JLS Document 59 Filed 03/09/18 Page 1 of 6 Page ID #:300 United States District Court Central District of California Case 8:15-cr-00142-JLS Document 59 Filed 03/09/18 Page 1 of 6 Page ID #:300 United States District Court Central District of California UNITED STATES OF AMERICA vs. Docket No. SACR 15-00142-JLS Defendant

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

County of Fresno Office of the District Attorney Lisa A. Smittcamp, District Attorney

County of Fresno Office of the District Attorney Lisa A. Smittcamp, District Attorney County of Fresno Office of the District Attorney Lisa A. Smittcamp, District Attorney REFERRAL COVER SHEET KEEP PAGES 1-4 FOR YOUR RECORDS Guidelines for completing the Real Estate Fraud Referral Form

More information

ANALYSIS OF 2011 LEGIS. IMMIGRATION RELATED LAWS

ANALYSIS OF 2011 LEGIS. IMMIGRATION RELATED LAWS ANALYSIS OF 2011 LEGIS. IMMIGRATION RELATED LAWS (THIS IS A DRAFT AND WILL BE REFINED AS THE NEW LAWS TAKE INTO EFFECT AND LEGISLATIVE RESEARCH AND GENERAL COUNSEL HAS RENUMBERED, RECONCILED AND MERGED

More information

[MUNICIPALITY POLICE DEPARTMENT] GENERAL ORDER. Volume: Chapter: #of Pages: FAIR AND EQUAL POLICING. Effective Date: Supersedes Order #:

[MUNICIPALITY POLICE DEPARTMENT] GENERAL ORDER. Volume: Chapter: #of Pages: FAIR AND EQUAL POLICING. Effective Date: Supersedes Order #: [MUNICIPALITY POLICE DEPARTMENT] GENERAL ORDER Volume: Chapter: #of Pages: FAIR AND EQUAL POLICING By the order of: Accreditation Standards: Effective Date: Supersedes Order #: PURPOSE: The [MUNICIPALITY]

More information

ROCHESTER INTERNATIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

ROCHESTER INTERNATIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION ROCHESTER INTERNATIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION BADGE # NEW AIRPORT BADGE BADGE RENEWAL ACCESS TYPE SECTION 1 APPLICANT INFORMATION Present this application along with two (2) forms

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities

More information

I-9 Employment Eligibility Verification & Employer Compliance in an Era of Heightened Worksite Enforcement

I-9 Employment Eligibility Verification & Employer Compliance in an Era of Heightened Worksite Enforcement I-9 Employment Eligibility Verification & Employer Compliance in an Era of Heightened Worksite Enforcement Jennifer Cook Julie George (202) 772-0910 (202) 772-0922 jcook@ jgeorge@ CLARK HILL PRESENTATION

More information

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 Current Laws: In Kansas, identity theft is defined as knowingly

More information

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION St. Cloud Regional Airport 1550 45 th Avenue Southeast, Suite #1 NEW St. Cloud, MN 56304-9535 (320) 255-7292 RENEWAL www.stcloudairport.com BADGE # ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

More information

Issue Brief for Congress

Issue Brief for Congress Order Code IB10095 Issue Brief for Congress Received through the CRS Web Crime Control: The Federal Response Updated March 5, 2003 JoAnne O'Bryant Domestic Social Policy Division Congressional Research

More information

Policies and Procedures No. 56

Policies and Procedures No. 56 1255 Imperial Avenue, Suite 1000 San Diego, CA 92101-7490 619/231-1466 FAX 619/234-3407 Policies and Procedures No. 56 SUBJECT: Enacted: 9/13/07 FRAUD IN THE WORKPLACE PURPOSE: To establish policies and

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21043 Updated January 19, 2005 CRS Report for Congress Received through the CRS Web Summary Immigration: S Visas for Criminal and Terrorist Informants Karma Ester Technical Information Specialist

More information

PRINCIPLES OF AMERICAN CRIMINAL LAW AND PROCEDURE

PRINCIPLES OF AMERICAN CRIMINAL LAW AND PROCEDURE PRINCIPLES OF AMERICAN CRIMINAL LAW AND PROCEDURE University of Wroclaw Law School Wroclaw, Poland March 27-28, 2010 Edward Carter Supervisor Financial Crimes Prosecution Illinois Attorney General s Office

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Glendale Police Department and obtained a police report number related to your identity

More information

MUST BE PRINTED IN COLOR

MUST BE PRINTED IN COLOR MUST BE PRINTED IN COLOR LAREDO INTERNATIONAL AIRPORT ACCESS MEDIA APPLICATION INSTRUCTIONS STEP 1-- STEP 2-- STEP 3-- STEP 5-- FILL OUT THE ACCESS MEDIA APPLICATION ENTIRELY. MAKE SURE TO USE BLUE INK.

More information

4B1.1 GUIDELINES MANUAL November 1, 2014

4B1.1 GUIDELINES MANUAL November 1, 2014 4B1.1 GUIDELINES MANUAL November 1, 2014 PART B - CAREER OFFENDERS AND CRIMINAL LIVELIHOOD 4B1.1. Career Offender (a) (b) A defendant is a career offender if (1) the defendant was at least eighteen years

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES Cite as: 556 U. S. (2009) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of

More information

Name {Last, First, Middle} Social Security Number: Check ( )Yes / ( ) No To submit to TSA Clearinghouse Print your Social Security Number Below

Name {Last, First, Middle} Social Security Number: Check ( )Yes / ( ) No To submit to TSA Clearinghouse Print your Social Security Number Below Savannah / Hilton Head International Airport Identification Badge Request / CHRC /S.I.D.A. &/or AOA Driver s Record / Parking Request Work 912-964-7501 ext 4424 or 4425 Fax 912-965-2727 pjones@savannahairport.com

More information

United States District Court

United States District Court Case 1:12-cr-00192-RJJ Doc #223 Filed 03/27/13 Page 1 of 6 Page ID#1356 AO 245B (MIWD Rev. 01/13)- Judgment in a Criminal Case United States District Court W estern District of Michigan UNITED STATES OF

More information

The Federal Information Technology Acquisition Reform Act (FITARA): Frequently Asked Questions

The Federal Information Technology Acquisition Reform Act (FITARA): Frequently Asked Questions The Federal Information Technology Acquisition Reform Act (FITARA): Frequently Asked Questions (name redacted) Specialist in Internet and Telecommunications Policy June 1, 2016 Congressional Research Service

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

Issue Brief for Congress

Issue Brief for Congress Order Code IB10095 Issue Brief for Congress Received through the CRS Web Crime Control: The Federal Response Updated July 1, 2002 JoAnne O'Bryant and Lisa Seghetti Domestic Social Policy Division Congressional

More information

ORLANDO SANFORD INTERNATIONAL AIRPORT AIRPORT ID BADGE APPLICATION

ORLANDO SANFORD INTERNATIONAL AIRPORT AIRPORT ID BADGE APPLICATION ORLANDO SANFORD INTERNATIONAL AIRPORT AIRPORT ID BADGE APPLICATION PAGE 1 A COPY OF REQUIRED DOCUMENTATION FOR IDENTIFICATION AND WORK AUTHORIZATION MUST BE ATTACHED TO THIS DOCUMENT COMPANY/T-HANGAR NAME:

More information

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

Identity Fraud: A Critical National and Global Threat

Identity Fraud: A Critical National and Global Threat Journal of Economic Crime Management Winter, 2004, Volume 2, Issue 1 Identity Fraud: A Critical National and Global Threat Gary R. Gordon Norman A. Willox, Jr. Donald J. Rebovich Utica College LexisNexis

More information

HOW TO VACATE AND EXPUNGE A FELONY CONVICTION

HOW TO VACATE AND EXPUNGE A FELONY CONVICTION HOW TO VACATE AND EXPUNGE A FELONY CONVICTION Introduction to Felony Expungement. 2 Information on House Bill 40 and the requirements for a felony expungement. Step 1: Obtain an Expungement Certification..

More information

EMPLOYMENT ELIGIBILITY VERIFICATION: I-9 AND IMMIGRATION COMPLIANCE. Farm Credit East

EMPLOYMENT ELIGIBILITY VERIFICATION: I-9 AND IMMIGRATION COMPLIANCE. Farm Credit East EMPLOYMENT ELIGIBILITY VERIFICATION: I-9 AND IMMIGRATION COMPLIANCE Farm Credit East Leonard J. D Arrigo, Esq. Immigration Practice Group December 15, 2017 The New Enforcement Mentality Enforcement emphasis

More information

EXHIBIT A EXHIBIT B EXHIBIT C EXHIBIT D WRITTEN TESTIMONY of ALEJANDRO N. MAYORKAS DIRECTOR U.S. CITIZENSHIP AND IMMIGRATION SERVICES FOR A HEARING ON SAFEGUARDING

More information